Setup Menus in Admin Panel

  • LOGIN
  • No products in the cart.

Course Name: The Complete Ethical Hacking with Kali for Beginners

Descriptions

Course Curriculum

Section 1: Introduction and Welcome
Introduction 00:00:00
Course Content 00:00:00
VERYY IMPORTANT NOTE 00:00:00
Section 2: Introduction to Pentesting and Kali
So what is Pentesting 00:00:00
Types of Pentests and Pentesting Process 00:00:00
Lets Talk About Kali 00:00:00
Wrap Up 00:00:00
Section 3: Installing Lab Environment
Why Do We Need a Lab Environment 00:00:00
Downloading Kali Vmware Workstation Metasploitable Windows 7 00:00:00
Installing VMware Player 00:00:00
Installing Kali 00:00:00
Installing Metasploitable 00:00:00
Installing Windows 7 00:00:00
Wrap Up 00:00:00
Section 4: Working with Kali
Working with Kali 00:00:00
Section 5: Configuring Victims
Victim Configuration 00:00:00
We Need Victims 00:00:00
Preparing Metasploitable 00:00:00
Good Old Friend Windows 00:00:00
Making Windows Vulnerable 00:00:00
Wrap Up 00:00:00
Section 6: Action Time with Nmap
Scanning with Nmap 00:00:00
First Scan with Nmap 00:00:00
Types of Port Scanning 00:00:00
Port Scanning Practice 00:00:00
Service and Version Detection 00:00:00
Lets Scan Faster 00:00:00
How to Save Nmap Results 00:00:00
Wrap Up 00:00:00
Section 7: Exploitation with Metasploit
Exploitation with Metasploit 00:00:00
Exploitation Basics 00:00:00
Metasploit is THE Exploitation Framework 00:00:00
Diving Into Metasploit 00:00:00
Import Operations with MSF database 00:00:00
Your First Shell 00:00:00
Lets Practice 00:00:00
Creating Users Remotely in Limited Shells 00:00:00
Wrap Up 00:00:00
Section 8: Windows Hacking and Meterpreter
Windows Hacking and Meterpreter 00:00:00
Introduction to Windows Hacking 00:00:00
Advanced Windows Scanning 00:00:00
Exploiting Windows 7 00:00:00
The Power of Metasploit Meterpreter 00:00:00
Wrap Up 00:00:00
Section 9: Course Wrap Up and Final Notes
First Step To Be a Professional Pentester Completed 00:00:00
Good Bye and See You Soon 00:00:00
Online Learning Thailand.
X